Eliciting and utilising knowledge for security event log analysis: an association rule mining and automated planning approach

Research output: Contribution to journalArticlepeer-review

Search results